Analysis

  • max time kernel
    137s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 07:22

General

  • Target

    ca32125e471b4abe832729dce8b22a3705355972f79b330c3c77abadcc6c6335.exe

  • Size

    20KB

  • MD5

    a2ff2dd6305264db1f4473cb50d77670

  • SHA1

    eee7656ea6f5d39019ec5ebe9ddb338710ba8b96

  • SHA256

    ca32125e471b4abe832729dce8b22a3705355972f79b330c3c77abadcc6c6335

  • SHA512

    523c15f9d2edbbdf390837bf88cd70c5cd63cd49bcb531dd83f0c1c665f39ae655c3d788f0febd0c8bdb439555a19ea9815a39fc13c733dc1973dabb2c660ee8

  • SSDEEP

    384:fY/7iMmQgVC+02JWuCSPmSQTebw/UqFPgh4oH9KkMA:y12JTPRQTeZq1ghEkMA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca32125e471b4abe832729dce8b22a3705355972f79b330c3c77abadcc6c6335.exe
    "C:\Users\Admin\AppData\Local\Temp\ca32125e471b4abe832729dce8b22a3705355972f79b330c3c77abadcc6c6335.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1536

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          20KB

          MD5

          f7d6ef88d686baa8c4fd450374e875c8

          SHA1

          05ba2ccf68cfdcf1a270824c759862369fcf6149

          SHA256

          2d870e2f3f475bf6a83dec7074ec9c423c93ac26b4752885119fe29dbec90a9b

          SHA512

          6419093b6e8b2ce08a1e148ecb1ef796e3398138c2cfa78a3ebc9b2cd0189400b1a7db7c838f7dce2983b4a8c8cecd7f82ec5fb7fb313966e978400daf2b3b41

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          20KB

          MD5

          f7d6ef88d686baa8c4fd450374e875c8

          SHA1

          05ba2ccf68cfdcf1a270824c759862369fcf6149

          SHA256

          2d870e2f3f475bf6a83dec7074ec9c423c93ac26b4752885119fe29dbec90a9b

          SHA512

          6419093b6e8b2ce08a1e148ecb1ef796e3398138c2cfa78a3ebc9b2cd0189400b1a7db7c838f7dce2983b4a8c8cecd7f82ec5fb7fb313966e978400daf2b3b41

        • \Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          20KB

          MD5

          f7d6ef88d686baa8c4fd450374e875c8

          SHA1

          05ba2ccf68cfdcf1a270824c759862369fcf6149

          SHA256

          2d870e2f3f475bf6a83dec7074ec9c423c93ac26b4752885119fe29dbec90a9b

          SHA512

          6419093b6e8b2ce08a1e148ecb1ef796e3398138c2cfa78a3ebc9b2cd0189400b1a7db7c838f7dce2983b4a8c8cecd7f82ec5fb7fb313966e978400daf2b3b41

        • memory/892-54-0x0000000075521000-0x0000000075523000-memory.dmp

          Filesize

          8KB

        • memory/892-58-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/892-59-0x0000000002760000-0x0000000002B60000-memory.dmp

          Filesize

          4.0MB

        • memory/1536-62-0x0000000002710000-0x0000000002B10000-memory.dmp

          Filesize

          4.0MB

        • memory/1536-63-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB